|
Term Papers on Computers
Anti-government Censorship On The Internet
Number of words: 1301 - Number of pages: 5.... Press, CNN Homepage).
Time Magazine gave national attention to the issue of Cyberporn. The title "On a screen near you: Cyberporn" was on Times July 3rd cover issue. this in a sense sent Washington into an uproar. Thinking that young children could get uncensored porn pictures off the Internet created chaos among the politicians. the Time cover story looked very convincing for many Americans who are uneducated about the Internet access. It suggested there was a sincere problem with uncensored material on the Internet. According to Time article 917,410 s .....
|
ISDN Vs. Cable Modems
Number of words: 2980 - Number of pages: 11.... while offering a
broader range of services.
The research for this report consisted of case studies of two commercial
deployments of residential Internet access, each introduced in the spring of
1994:
· Continental Cablevision and Performance Systems International (PSI)
jointly developed PSICable, an Internet access service deployed over upgraded
cable plant in Cambridge, Massachusetts;
· Internex, Inc. began selling Internet access over ISDN telephone
circuits available from Pacific Bell. Internex's customers are residences and
small businesses in the "Silico .....
|
Response To AOL Controversy
Number of words: 702 - Number of pages: 3.... AOLers are paying for the
appealing menus, graphics and services AOL uses to drive their customers to the
internet. These same features can be located anywhere else on the net with the
aid of any search device, such as infoseek, yahoo, microsoft network or web-
crawler. These sites are no harder to use and they provide lots of helpful
menus and information.
In Wood's article, he states that he lives in Chicago, and AOL has
several different access numbers to try if one is busy. He writes that often
when he has tried to log on using all of the available .....
|
Economic Consequences Of Software Crime
Number of words: 3879 - Number of pages: 15.... and then load that software onto more than one computer, or lend,
copy or distribute software for any reason without the prior written
consent of the software manufacturer. Many software managers are
concerned with the legal compliance, along with asset management and costs
to their organizations. Many firms involve their legal departments and
human resources in regards to software distribution and licensing.
Information can qualify to be property in two ways; patent law and
copyright laws which are creations of federal statutes, which are subject
to Cons .....
|
Which Computer Is The Fastest
Number of words: 1135 - Number of pages: 5.... You can
understand why the education market is almost entirely apple based.
Recent surveys confirm that from kindergarten through college, Apple has
cornered the market in education, and remains number one in this U.S. market.
Apple Macintosh computers account for 60% of the 5.9 million machines in U.S.
schools for the 1995-96 school year. Only 29% of schools use the Microsoft/Intel
platform, and DOS only accounts for a measly 11%. Also it was reported that
18.4% of 4 year college students own the Macintosh. 55% of college students own
a computer, and App .....
|
The Internet
Number of words: 1203 - Number of pages: 5.... here is useless, as if it wasn't
there. Secondly, to get anything interesting or informative from the web,
no matter what the subject, one must know its exact location, else one is
compelled to dive into a muddy flood of shit. This leads me to the point of
clarifying the term "information":
This word usually has two meanings, a fact that contributes to
misunderstandings. It can mean a piece of wanted, useful and understandable
data or it can also mean any piece of data. When a stupid chick posts some
info that her doggie just pissed on the carpet and she inc .....
|
Privacy And Anonymity And Information Network Technologies
Number of words: 1692 - Number of pages: 7.... information has been given commercial value, especially
with regards to the issue of who owns and controls this information.
The information age has been a period that has allowed rights to privacy
to beocme seriously jeopardized by new information technologies.
Richard A. Spinello, has defined two distinct phases to the systematic
erosion of information privacy. The first he calls the 'data base
phase'. The emergence of sophisticatd data base technology in the early
eighties made it possible to store and retrieve large amounts .....
|
Computers, I Don't Like Computers. So Why Can't I Get A Job?
Number of words: 511 - Number of pages: 2.... is a key example, she was
born way before there was any PC's or networked offices. She remembers the big
punchcard monsters that she would have to insert cards into to give it
instructions. But my point is that she was not exposed to a computer as everyday
life. Now she is really behind so to speak in the computing world. Computers
back then were huge, they were usually stored in wharehouses. The earlier ones
used paper with holes in them to give it instructions. Later the pre-PC's used
tape cartridges to store data on. Then came along in 1979 the first real
p .....
|
|
|